Warning: Permanently added '10.128.0.97' (ED25519) to the list of known hosts. executing program [ 34.488501][ T6484] loop0: detected capacity change from 0 to 32768 [ 34.492330][ T6484] (syz-executor408,6484,0):ocfs2_block_check_validate:402 ERROR: CRC32 failed: stored: 0xb3775c19, computed 0x2dd1c265. Applying ECC. [ 34.493731][ T6484] (syz-executor408,6484,0):ocfs2_block_check_validate:402 ERROR: CRC32 failed: stored: 0xb3775c19, computed 0x2dd1c265. Applying ECC. [ 34.499070][ T6484] JBD2: Ignoring recovery information on journal [ 34.517431][ T6484] ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. [ 34.532008][ T6484] [ 34.532762][ T6484] ====================================================== [ 34.534690][ T6484] WARNING: possible circular locking dependency detected [ 34.536600][ T6484] 6.16.0-rc1-syzkaller-g19272b37aa4f #0 Not tainted [ 34.538442][ T6484] ------------------------------------------------------ [ 34.540386][ T6484] syz-executor408/6484 is trying to acquire lock: [ 34.542173][ T6484] ffff0000de8542c0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#7){+.+.}-{4:4}, at: ocfs2_reserve_local_alloc_bits+0x104/0x26a0 [ 34.545981][ T6484] [ 34.545981][ T6484] but task is already holding lock: [ 34.547997][ T6484] ffff0000e3c006f8 (&oi->ip_xattr_sem){++++}-{4:4}, at: ocfs2_xattr_set+0x330/0xe9c [ 34.550621][ T6484] [ 34.550621][ T6484] which lock already depends on the new lock. [ 34.550621][ T6484] [ 34.553562][ T6484] [ 34.553562][ T6484] the existing dependency chain (in reverse order) is: [ 34.556037][ T6484] [ 34.556037][ T6484] -> #4 (&oi->ip_xattr_sem){++++}-{4:4}: [ 34.558299][ T6484] down_read+0x58/0x2f8 [ 34.559638][ T6484] ocfs2_init_acl+0x258/0x5f0 [ 34.561266][ T6484] ocfs2_mknod+0x1028/0x1cf0 [ 34.562703][ T6484] ocfs2_mkdir+0x190/0x474 [ 34.564066][ T6484] vfs_mkdir+0x284/0x424 [ 34.565362][ T6484] do_mkdirat+0x1f8/0x4c8 [ 34.566694][ T6484] __arm64_sys_mkdirat+0x8c/0xa4 [ 34.568216][ T6484] invoke_syscall+0x98/0x2b8 [ 34.569866][ T6484] el0_svc_common+0x130/0x23c [ 34.571410][ T6484] do_el0_svc+0x48/0x58 [ 34.572695][ T6484] el0_svc+0x58/0x17c [ 34.573942][ T6484] el0t_64_sync_handler+0x78/0x108 [ 34.575481][ T6484] el0t_64_sync+0x198/0x19c [ 34.576866][ T6484] [ 34.576866][ T6484] -> #3 (jbd2_handle){.+.+}-{0:0}: [ 34.579032][ T6484] start_this_handle+0xe74/0x10dc [ 34.580666][ T6484] jbd2__journal_start+0x288/0x51c [ 34.582235][ T6484] jbd2_journal_start+0x3c/0x4c [ 34.583878][ T6484] ocfs2_start_trans+0x368/0x6b0 [ 34.585373][ T6484] ocfs2_modify_bh+0xe4/0x43c [ 34.586805][ T6484] ocfs2_local_read_info+0x104c/0x1364 [ 34.588447][ T6484] dquot_load_quota_sb+0x6bc/0xa90 [ 34.590068][ T6484] dquot_load_quota_inode+0x274/0x4e4 [ 34.591666][ T6484] ocfs2_enable_quotas+0x17c/0x3b4 [ 34.593198][ T6484] ocfs2_fill_super+0x4018/0x5340 [ 34.594696][ T6484] get_tree_bdev_flags+0x360/0x414 [ 34.596272][ T6484] get_tree_bdev+0x2c/0x3c [ 34.597695][ T6484] ocfs2_get_tree+0x28/0x38 [ 34.599138][ T6484] vfs_get_tree+0x90/0x28c [ 34.600483][ T6484] do_new_mount+0x228/0x814 [ 34.601881][ T6484] path_mount+0x5b4/0xde0 [ 34.603212][ T6484] __arm64_sys_mount+0x3e8/0x468 [ 34.604677][ T6484] invoke_syscall+0x98/0x2b8 [ 34.606207][ T6484] el0_svc_common+0x130/0x23c [ 34.607717][ T6484] do_el0_svc+0x48/0x58 [ 34.608998][ T6484] el0_svc+0x58/0x17c [ 34.610229][ T6484] el0t_64_sync_handler+0x78/0x108 [ 34.611779][ T6484] el0t_64_sync+0x198/0x19c [ 34.613229][ T6484] [ 34.613229][ T6484] -> #2 (&journal->j_trans_barrier){.+.+}-{4:4}: [ 34.615734][ T6484] down_read+0x58/0x2f8 [ 34.617224][ T6484] ocfs2_start_trans+0x35c/0x6b0 [ 34.618738][ T6484] ocfs2_modify_bh+0xe4/0x43c [ 34.620153][ T6484] ocfs2_local_read_info+0x104c/0x1364 [ 34.621791][ T6484] dquot_load_quota_sb+0x6bc/0xa90 [ 34.623383][ T6484] dquot_load_quota_inode+0x274/0x4e4 [ 34.625046][ T6484] ocfs2_enable_quotas+0x17c/0x3b4 [ 34.626696][ T6484] ocfs2_fill_super+0x4018/0x5340 [ 34.628224][ T6484] get_tree_bdev_flags+0x360/0x414 [ 34.629751][ T6484] get_tree_bdev+0x2c/0x3c [ 34.631109][ T6484] ocfs2_get_tree+0x28/0x38 [ 34.632554][ T6484] vfs_get_tree+0x90/0x28c [ 34.633987][ T6484] do_new_mount+0x228/0x814 [ 34.635442][ T6484] path_mount+0x5b4/0xde0 [ 34.636807][ T6484] __arm64_sys_mount+0x3e8/0x468 [ 34.638311][ T6484] invoke_syscall+0x98/0x2b8 [ 34.639700][ T6484] el0_svc_common+0x130/0x23c [ 34.641366][ T6484] do_el0_svc+0x48/0x58 [ 34.642702][ T6484] el0_svc+0x58/0x17c [ 34.644155][ T6484] el0t_64_sync_handler+0x78/0x108 [ 34.645710][ T6484] el0t_64_sync+0x198/0x19c [ 34.647113][ T6484] [ 34.647113][ T6484] -> #1 (sb_internal#2){.+.+}-{0:0}: [ 34.649194][ T6484] ocfs2_start_trans+0x1f4/0x6b0 [ 34.650783][ T6484] ocfs2_mknod+0xc50/0x1cf0 [ 34.652235][ T6484] ocfs2_mkdir+0x190/0x474 [ 34.653703][ T6484] vfs_mkdir+0x284/0x424 [ 34.655048][ T6484] do_mkdirat+0x1f8/0x4c8 [ 34.656409][ T6484] __arm64_sys_mkdirat+0x8c/0xa4 [ 34.657909][ T6484] invoke_syscall+0x98/0x2b8 [ 34.659455][ T6484] el0_svc_common+0x130/0x23c [ 34.661040][ T6484] do_el0_svc+0x48/0x58 [ 34.662564][ T6484] el0_svc+0x58/0x17c [ 34.663796][ T6484] el0t_64_sync_handler+0x78/0x108 [ 34.665338][ T6484] el0t_64_sync+0x198/0x19c [ 34.666765][ T6484] [ 34.666765][ T6484] -> #0 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#7){+.+.}-{4:4}: [ 34.669875][ T6484] __lock_acquire+0x1774/0x30a4 [ 34.671316][ T6484] lock_acquire+0x14c/0x2e0 [ 34.672693][ T6484] down_write+0x50/0xc0 [ 34.674027][ T6484] ocfs2_reserve_local_alloc_bits+0x104/0x26a0 [ 34.675877][ T6484] ocfs2_reserve_clusters_with_limit+0x198/0x9e0 [ 34.677844][ T6484] ocfs2_reserve_clusters+0x3c/0x50 [ 34.679504][ T6484] ocfs2_init_xattr_set_ctxt+0x37c/0x774 [ 34.681306][ T6484] ocfs2_xattr_set+0x920/0xe9c [ 34.682769][ T6484] ocfs2_xattr_trusted_set+0x4c/0x64 [ 34.684384][ T6484] __vfs_setxattr+0x3d8/0x400 [ 34.686032][ T6484] __vfs_setxattr_noperm+0x120/0x5c4 [ 34.687781][ T6484] __vfs_setxattr_locked+0x1ec/0x218 [ 34.689496][ T6484] vfs_setxattr+0x158/0x2ac [ 34.690918][ T6484] filename_setxattr+0x20c/0x4f8 [ 34.692434][ T6484] path_setxattrat+0x2e8/0x320 [ 34.694025][ T6484] __arm64_sys_setxattr+0xc0/0xdc [ 34.695743][ T6484] invoke_syscall+0x98/0x2b8 [ 34.697225][ T6484] el0_svc_common+0x130/0x23c [ 34.698681][ T6484] do_el0_svc+0x48/0x58 [ 34.699989][ T6484] el0_svc+0x58/0x17c [ 34.701288][ T6484] el0t_64_sync_handler+0x78/0x108 [ 34.702869][ T6484] el0t_64_sync+0x198/0x19c [ 34.704333][ T6484] [ 34.704333][ T6484] other info that might help us debug this: [ 34.704333][ T6484] [ 34.707308][ T6484] Chain exists of: [ 34.707308][ T6484] &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#7 --> jbd2_handle --> &oi->ip_xattr_sem [ 34.707308][ T6484] [ 34.711716][ T6484] Possible unsafe locking scenario: [ 34.711716][ T6484] [ 34.713859][ T6484] CPU0 CPU1 [ 34.715560][ T6484] ---- ---- [ 34.717058][ T6484] lock(&oi->ip_xattr_sem); [ 34.718349][ T6484] lock(jbd2_handle); [ 34.720256][ T6484] lock(&oi->ip_xattr_sem); [ 34.722301][ T6484] lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#7); [ 34.724441][ T6484] [ 34.724441][ T6484] *** DEADLOCK *** [ 34.724441][ T6484] [ 34.726712][ T6484] 3 locks held by syz-executor408/6484: [ 34.728261][ T6484] #0: ffff0000c9b6e428 (sb_writers#7){.+.+}-{0:0}, at: mnt_want_write+0x44/0x9c [ 34.730864][ T6484] #1: ffff0000e3c009c0 (&sb->s_type->i_mutex_key#16){+.+.}-{4:4}, at: vfs_setxattr+0x138/0x2ac [ 34.733860][ T6484] #2: ffff0000e3c006f8 (&oi->ip_xattr_sem){++++}-{4:4}, at: ocfs2_xattr_set+0x330/0xe9c [ 34.736632][ T6484] [ 34.736632][ T6484] stack backtrace: [ 34.738251][ T6484] CPU: 0 UID: 0 PID: 6484 Comm: syz-executor408 Not tainted 6.16.0-rc1-syzkaller-g19272b37aa4f #0 PREEMPT [ 34.741646][ T6484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 34.744583][ T6484] Call trace: [ 34.745556][ T6484] show_stack+0x2c/0x3c (C) [ 34.746800][ T6484] __dump_stack+0x30/0x40 [ 34.748019][ T6484] dump_stack_lvl+0xd8/0x12c [ 34.749273][ T6484] dump_stack+0x1c/0x28 [ 34.750425][ T6484] print_circular_bug+0x324/0x32c [ 34.751947][ T6484] check_noncircular+0x154/0x174 [ 34.753319][ T6484] __lock_acquire+0x1774/0x30a4 [ 34.754659][ T6484] lock_acquire+0x14c/0x2e0 [ 34.755930][ T6484] down_write+0x50/0xc0 [ 34.757206][ T6484] ocfs2_reserve_local_alloc_bits+0x104/0x26a0 [ 34.758994][ T6484] ocfs2_reserve_clusters_with_limit+0x198/0x9e0 [ 34.760818][ T6484] ocfs2_reserve_clusters+0x3c/0x50 [ 34.762256][ T6484] ocfs2_init_xattr_set_ctxt+0x37c/0x774 [ 34.763802][ T6484] ocfs2_xattr_set+0x920/0xe9c [ 34.765167][ T6484] ocfs2_xattr_trusted_set+0x4c/0x64 [ 34.766671][ T6484] __vfs_setxattr+0x3d8/0x400 [ 34.768026][ T6484] __vfs_setxattr_noperm+0x120/0x5c4 [ 34.769533][ T6484] __vfs_setxattr_locked+0x1ec/0x218 [ 34.771062][ T6484] vfs_setxattr+0x158/0x2ac [ 34.772308][ T6484] filename_setxattr+0x20c/0x4f8 [ 34.773691][ T6484] path_setxattrat+0x2e8/0x320 [ 34.775095][ T6484] __arm64_sys_setxattr+0xc0/0xdc [ 34.776610][ T6484] invoke_syscall+0x98/0x2b8 [ 34.778014][ T6484] el0_svc_common+0x130/0x23c [ 34.779304][ T6484] do_el0_svc+0x48/0x58 [ 34.780449][ T6484] el0_svc+0x58/0x17c [ 34.781545][ T6484] el0t_64_sync_handler+0x78/0x108 [ 34.782970][ T6484] el0t_64_sync+0x198/0x19c executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program